From: Jim Hart <hart@chaos.bsu.edu>
To: wmo@digibd.com (Bill O’Hanlon)
Message Hash: ba82ae992f2ab33f00f5308b0bc5c23e22681e454b7b520f35d0259944c15adb
Message ID: <199408190757.CAA24886@chaos.bsu.edu>
Reply To: <9408172311.AA02156@poe.digibd.com>
UTC Datetime: 1994-08-19 07:58:16 UTC
Raw Date: Fri, 19 Aug 94 00:58:16 PDT
From: Jim Hart <hart@chaos.bsu.edu>
Date: Fri, 19 Aug 94 00:58:16 PDT
To: wmo@digibd.com (Bill O'Hanlon)
Subject: Re: cfs & remailers
In-Reply-To: <9408172311.AA02156@poe.digibd.com>
Message-ID: <199408190757.CAA24886@chaos.bsu.edu>
MIME-Version: 1.0
Content-Type: text/plain
Bill O Hanlon:
> In that case, even if I were to keep logs, all that anyone would know from
> a message is that a particular user used a remailer, or that a particular
> cleartext message had a certain remailer as its jumpoff point. Not both.
They'd learn both if they had snooped the entire remail chain (which
is the equivalent of collusion). Going back and retrieving logs
for all the the links, after the snoopers have discovered an
important message they want to trace, is both an easier and a more
likely attack than wiretapping all the links in real time in
anticipation of an important message -- unless the remailer
operators snoop-proof their logs.
Also keep in mind that, given the lack of a good user interface,
there is currently too little properly encrypted and nested remailer
traffic to create anything approaching a true digital mix.
Jim Hart
hart@chaos.bsu.edu
Return to August 1994
Return to “Matt Blaze <mab@crypto.com>”